Soviet Active Measures Focus on Forgeries Apr 1983.P65

Total Page:16

File Type:pdf, Size:1020Kb

Soviet Active Measures Focus on Forgeries Apr 1983.P65 Foreign Affairs Note United States Department of State Washington, D.C. SOVIET ACTIVE MEASURES: April 1983 FOCUS ON FORGERIES For many years forgeries have been a staple of Soviet active Some forgeries are not designed for public dissemination measures. In the post-World War II period, the Soviets and their but rather are intended to circulate privately. Their purpose is to allies, especially Czechoslovakia and East Germany, have repeatedly influence individual leaders and opinionmakers. The damage is distributed false documents to mislead target audiences. In testi- harder to assess. The purported author often gets no opportunity mony before the Senate Judiciary Committee in 1961, U.S. officials to set the record straight. identified 31 documents as communist forgeries.1 A former Czech Some forgeries have general themes and are recirculated intelligence officer, Ladislav Bittman, who defected in 1968, has repeatedly. Two examples, still in use in 1983, are the so-called described how forged documents are prepared and disseminated.2 holocaust documents (Fig. 1) and the false destabilization In 1980, the House Select Committee on Intelligence publicized a U.S. Army Field Manual, FM 30-31 B (Fig. 2). The first, a number of forgeries which circulated in the 1970s.3 Congressional doctored U.S. military planning document shows supposed U.S. hearings in 1982 placed additional cases of political forgeries on the nuclear targets in Western Europe. First surfacing in the record.4 This study examines communist techniques for producing Norwegian magazine Orientering in 1967, it was denounced forgeries and a number of fabrications which have come to light in then but has resurfaced more than 20 times since in various 1982. countries. Most recently, it was the basis for questions in the City Council of Graz, Austria, in December 1982. Operational Control The subject of the fake Army manual is destabilization techniques in noncommunist countries. Its purpose is to Proposals for forgeries and other active measures may originate stimulate suspicion about U.S. intentions and activities. The first either in KGB headquarters or in the KGB residency in the target mention of it was in March 1975 in the Turkish newspaper country. Whatever the source, the local residency and Moscow Baris. Later that year an attempt to circulate it within the collaborate closely. Depending on its sensitivity and importance, Philippine Government led to its exposure. It has appeared a approval for a forgery may be obtained from the KGB leadership, number of times since, most recently in a January 1982 article in the International Department of the Central Committee of the the government-affiliated Maltese newspaper Il Torca. Communist Party, or the Secretariat of the Central Committee itself. KGB specialists prepare the forgery under the supervision of the Technical Aspects active measures section of the KGBs First Chief Directorate. Although any KGB agent or asset may be used to surface the The Soviets have developed considerable technical proficiency document, the chief of the KGB residencys active measures group in fabricating U.S. Government documents, but quality varies controls the operation. greatly depending on the time devoted to preparation and the Many forgeries aim at the media. Although the fabricators are nature of the intended audience. Even the best forgeries can be aware that once a document appears in print the supposed author unmasked by expert analysis. Indicators that a document may be will promptly deny its authenticity, the Soviets calculate that a forged relate to: denial will never entirely offset the damage from news stories based on the forgery. Surfacing. The forger confronts the problem of reaching the intended audience without revealing the origin of the 1 Communist Forgeries, Senate Committee on the Judiciary, document. Mailing the fabrication without a return address or Government Printing Office, 1961. with a spurious one is the most common method. 2 Ladislav Bittman, The Deception Game, Ballantine, 1972. 3 Soviet Covert Action: The Forgery Offensive, House Permanent Select Committee on Intelligence, Government Printing Office, 1980. 4 Soviet Active Measures, House Permanent Select Committee on Intelligence, Government Printing Office, 1982. An informal research study for background information Cover Letters. Frequently, the document is transmitted with Content. Soviet forgeries tend to avoid specific allegations a covering letter which attempts to lend authenticity to the forgery. that can be disproved. (Oral disinformation is a more likely Typically, the cover letter summarizes the content of the forgery vehicle for falsehoods of this sort.) They highlight statements that and explains the authors alleged motive for transmitting it in exacerbate U.S. relations with a target country and reinforce terms of outrage over the revelations contained in the fabrication. existing tensions or anti-U.S. sentiments. An example is the The letter is always untraceable and frequently unsigned-with the Aviation Personnel International letter implying U.S. collusion in writer excusing the lack of a signature by claiming fear for his life South African plots against black African countries (Fig. 6). In the or position. An example is the unsigned cover letter used in an false Department of Defense press release on the Falklands, attempt to surface FM 30-31 B as shown in Fig. 2. Secretary of Defense Weinberger allegedly refers to Argentinas Format. The Soviets go to considerable effort to collect stubborn and selfish attitude in the conflict (Fig. 7). useful forms, letters, official signatures, and the like as models for their efforts. (Fig. 7 reproduces a forged Department of Defense Impact press release.) While the Soviets produce authentic-looking documents in many cases, there are almost always small discrep- The effectiveness of a political forgery often depends as much on ancies and mistakes. Government forms and procedures frequently the recipients mental predisposition as on the skills of the forger. change; for them to be duplicated with total accuracy, a detailed Without an inclination to accept as authentic documents which knowledge-difficult for an outsider to achieve-is required. reinforce existing beliefs and opinions, most forgeries would have Language. The texts of some forged U.S. documents little impact. The typical telltale patterns-anonymous surfacing, indicate that they are not prepared by native-born speakers of technical and linguistic aberrations, news value and timeliness, American English. Phraseology is stilted; British spellings may and contribution to Soviet policy and propaganda goals-would occur in purported American documents (British forms are widely suggest to impartial readers the need for careful investigation. taught in Soviet schools); and some expressions appear to be Behind the repeated acceptance of forgeries that already have been literally translated from the Russian. For example, the forged exposed, such as the holocaust papers or the fake field manual, lie military memo on NATO air defense exercises (Fig. 8) uses the the prejudices of the deceived. British spelling manoeuvre instead of the American maneu- Many forgeries aimed at the media never achieve uncritical ver; the Aviation Personnel International letter (Fig. 9) refers to publication or do so only in openly procommunist vehicles. But competent bodies in a direct translation of the Russian expres- the risk is low. A forgery can be denounced, but once published it sion kompetentnyye organy, a euphemism for security services but assumes a credibility of its own and can create the impression that not used in this sense in American English. While these linguistic where there is smoke, there is fire. An illustration of the flaws may not be evident to the target audience, especially in long-term, subliminal effect of calculated fabrications turned up in non-English speaking areas, they are important clues in establish- Finlands largest circulation daily, Helsingin Sanomat, in Septem- ing lack of authenticity. ber 1982. A letter to the editor, signed by three doctors with no News Value. In many cases the forger tries to influence known communist connections, indicated an acceptance of the public opinion by achieving uncritical publication of the product. holocaust documents as authentic, despite their repeated exposure. To do this, the media must be convinced not only of the documents authenticity but also of its news value. To heighten ANNEXES: Recent Forgeries interest, many forgeries bear an inflated security classification or purport to be the correspondence of high-ranking officials. Figure 1 : Holocaust Papers Timing. Political forgeries, whether targeted at public Figure 2: Destabilization Field Manual opinion or select decisionmaking groups, are often tied to current Figure 3: Greek Coup: Clark-Stearns Letter issues. The false Department of Commerce memorandum (Fig. 5) Figure 4: NATO Nuclear Deployments: Haig-Luns Letter dealing with trade issues, for example, circulated just before the Figure 5: Gas Pipeline Memo Versailles economic summit meeting of June 1982. The sudden Figure 6: South Africa: Aviation Personnel International appearance of a private or confidential document at a time of Letter political sensitivity can be a warning of possible fraud. Figure 7: The Falklands: Department of Defense Press Photo Copies. Forgeries are distributed in the form of photo Release copies. This facilitates cutting and pasting so that signatures and Figure
Recommended publications
  • Historical Dictionary of Russian and Soviet Intelligence
    Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc.
    [Show full text]
  • Organization of the Soviet Intelligence and Security Structure Source
    Figure 1- Organization of the Soviet Intelligence and Security Structure General Chairman First Deputy Chairman Chief, GRU Deputy Chairman Space Intelligence Operational/ Technical Administrative/ Directorate for Foreign First Deputy Chief Chief of Information Personnel Directorate Political Department Financial Department Eighth Department Archives Department (KGB) Directorate Directorate Technical Directorate Relations First Chief Directorate First Directorate: Seventh Directorate: (Foreign) Europe and Morocco NATO Second Directorate: North and South Second Chief Eighth Directorate: America, Australia, Directorate (Internal) Individual Countries New Zealand, United Kingdom Fifth Chief Directorate Ninth Directorate: Third Directorate: Asia (Dissidents) Military Technology Eighth Chief Fourth Directorate: Tenth Directorate: Directorate Africa Military Economics (Communications) Fifth Directorate: Chief Border Troops Eleventh Directorate: Operational Directorates Doctrine, Weapons Intelligence Sixth Directorate: Third (Armed Forces) Twelfth Directorate: Radio, Radio-Technical Directorate Unknown Intelligence Seventh (Surveillance) First Direction: Institute of Directorate Moscow Information Ninth (Guards) Second Direction: East Information Command Directorate and West Berlin Post Third: National Technical Operations Liberation Directorate Movements, Terrorism Administration Fourth: Operations Directorate from Cuba Personnel Directorate Special Investigations Collation of Operational Experience State Communications Physical Security Registry and Archives Finance Source: (Richelson 22, 27) Figure 2- Organization of the United States Intelligence Community President National Security Advisor National Security DNI State DOD DOJ DHS DOE Treasury Commerce Council Nuclear CIO INR USDI FBI Intelligence Foreign $$ Flow Attachés Weapons Plans DIA NSA NGA NRO Military Services NSB Coast Guard Collection MSIC NGIC (Army) MRSIC (Air Analysis AFMic Force) NCTC J-2's ONI (Navy) CIA Main DIA INSCOM (Army) NCDC MIA (Marine) MIT Source: (Martin-McCormick) .
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • The European Union Approach to Disinformation and Misinformation the Case of the 2019 European Parliament Elections
    University of Strasbourg European Master’s Degree in Human Rights and Democratisation A.Y. 2018/2019 The European Union approach to disinformation and misinformation The case of the 2019 European Parliament elections Author: Shari Hinds Supervisor: Dr Florence Benoit- Rohmer Abstract In the last years, the phenomenon of so called “fake news” on social media has become more and more discussed, in particular after the 2016 US elections. The thesis examines how the European Union is approaching “fake news” on social media, taking the 2019 European Parliament elections as a case study. This research favours the words “disinformation” and “misinformation”, over “fake news”. It, firstly, explores the different way of spreading disinformation and misinformation and how this can affect our human rights. This thesis will, secondly, focus on the different approaches, remedies and solutions to false information, outlining their limits, in order to recommend to the European Union, the best policies to tackle the phenomenon. The research will, thirdly, focuses on how the European Institutions are currently approaching this issue on social media and the steps that have been taken to protect European citizens from disinformation and misinformation; at this purpose the relevant European policy documents will be analysed. This analysis is necessary to understand the ground of the EU elections. The thesis will conclude with the case study of 2019 European Parliament elections. It will find if there have been cases of disinformation on social media and if the actions taken by the European Union have been enough to protect the second largest elections in the world. Key words: fake news, disinformation, misinformation, co-regulation, Russian disinformation campaigns, European Union, 2019 European Parliament elections.
    [Show full text]
  • Disinformation Campaigns
    August 2016 w . c e p a o r g Winning the Information War Techniques and Counter-strategies to Russian Propaganda in Central and Eastern Europe A Report by CEPA’s Information Warfare Project in Partnership with the Legatum Institute Edward Lucas and Peter Pomeranzev I WINNING THE INFORMATION WAR Acknowledgments This report, “Winning the Information War: Techniques and Counter-Strategies in Russian Propaganda,” is produced under the auspices of the Center for European Policy Analysis’ (CEPA) Information Warfare Initiative. Co-authored by CEPA Senior Vice President Edward Lucas and Legatum Institute Senior Fellow Peter Pomerantsev, it is part of an ongoing effort at CEPA to monitor, collate, analyze, rebut and expose Russian propaganda in the countries of Central and Eastern Europe (CEE). Previous publications in this series provided an analytical foundation for evaluating the methods and aims of Russian propaganda. This report extends that research, examining how Russian propaganda is being employed across the CEE region, the perils it presents and actionable counter-strategies for addressing it. In preparing this report, the authors conducted an extended assessment of the existing record of Russian, English and Baltic language literature on the subject of information warfare. They solicited written inputs from, and conducted interviews with, members of the scholarly, academic and expert community who are investigating specific dimensions of Russia’s “new” propaganda. Additionally, the authors solicited written and conceptual inputs through
    [Show full text]
  • Active Measures: Moscow Blends Media/Technology in Information
    Warren | 2 Active Measures: Moscow Blends Center for Anticipatory Media/Technology in Information Intelligence Student Warfare to Influence Elections Research Reports Eric Warren December 2019 Executive Summary In its report on Russian active measures campaigns to interfere with the 2016 United States election, the US Senate Select Committee on Intelligence found that the Russian government conducted a comprehensive disinformation campaign against US election infrastructure that started in at least 2014 and carried through to 2017.1 Ensuing reports conclude that Russian active measures, or political warfare designed to influence foreign affairs without reaching the threshold of a hot war, continue to permeate American political discourse.2 Russia’s intent is to influence the outcome of upcoming elections by leveraging, enhancing, and fabricating differences in American society. This poses a serious national security threat.3 While Russian influence in the 2016 US presidential campaign gained wide attention, Russia has a long history of disinformation campaigns targeting US elections, beginning in at least 1919. Over the next century, Russia honed its disinformation tactics, culminating in the manipulation of voters through the use of new media as a way to use America’s “civilization, identity, and will by generating complexity, confusion, and political and social schisms.”4 Russia’s contemporary disinformation efforts to affect internal political debate reaches beyond US borders and strikes within US allies’ and other nations’ boundaries.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • Psychological Operations Principles and Case Studies
    Psychological Operations Principles and Case Studies Editor Frank L. Goldstein, Col, USAF Co-editor Benjamin F. Findley, Jr., Col, USAFR Air University. Press Maxwell Air Force Base, Alabama September 1996 Library of Congress Cataloging-in-Publication Data Psychological operations : principles and case studies j editor, Frank L. Goldstein ; co-editor, Benjamin F. Findley. p. cm. At head of t.p. : AU Shield. "September 1996 ." 1. Psychological warfare-United States . 2. Psychological warfare-Case studies . 1. Goldstein, Frank L., 1945- . 11. Findley, Benjamin F. UB276.P82 1996 355 .3'434-dc20 96-22817 CIP ISBN 1-58566-016-7 Disclaimer This publication was produced in the Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts . The views expressed in this publication are those of the authors and do not reflect the official policy or position of the Department of Defense or the United States government. This publication has been reviewed by security and policy review authorities and is cleared for public release . For Sale by the Superintendent of Documents US Government Printing Office Washington, DC 20402 Contents Essay Page DISCLAIMER -------------------- ii FOREWORD . Lx PREFACE ______________________ xi PART I Nature and Scope of Psychological Operations (PSYOP) Introduction . 3 1 Psychological Operations : An Introduction Col Frank L. Goldstein, USAF Col Daniel W. Jacobowitz, USAF, Retired 2 Strategic Concepts for Military Operations . , 17 Col Fred W. Walker, USAF, Retired 3 No More Tactical Information Detachments: US Military Psychological Operations in Transition . 25 Col Alfred H. Paddock, Jr., USA, Retired 4 Blending Military and Civilian PSYOP Paradigms .
    [Show full text]
  • A Cold War Crusader on an Ideological Battlefield: Andrew Eiva, the KGB, and the Soviet-Afghan War Although He Was Only Five Ye
    A Cold War Crusader on an Ideological Battlefield: Andrew Eiva, the KGB, and the Soviet-Afghan War Although he was only five years old Andrew Eiva remembers that summer evening in Brockton, Massachusetts in 1953 like it was yesterday. “I still remember the very spot in the yard where I was standing,” he recalls, “the temperature of the air, the starlit sky.” His parents “were talking about the old country [Lithuania] in various ways, reminiscences, and she [his mother] told me about my grandfather being taken away and later executed.” His grandfather was a military hero who kept Russian-led Red Army troops at bay following the 1917 Bolshevik Revolution and Civil War, 1918-1921, thereby securing self-rule for Lithuania in the interwar period. Eiva’s parents further informed their young son that the Soviets were still holding his grandmother and many of his aunts and uncles in Siberia. “Upon hearing that I was overcome with emotion, I ran up, ran over the little hilltop across the street by myself and I vowed,” he says with a chuckle, “to destroy the Soviet empire.”1 Several decades later in the 1980s Eiva sought to do just that by supporting Afghan rebels, the mujahedeen, against Soviet troops in the Soviet-Afghan War.2 An analysis of Eiva’s role as a Cold War crusader based on material he wrote as a lobbyist, Western media accounts, and clandestine reports about him from the files of the Lithuanian KGB reveals his behind-the-scenes significance as an ideologically-driven individual outside of the confines of government helping to shape US policy during the Soviet-Afghan War, thereby hinting at a reason the Cold War ended the way that it did.3 The conflict in Afghanistan, 1 Phone interview with Andrew Eiva conducted by the author 5 June 2015.
    [Show full text]
  • Nosenko: Five Paths to Judgment RICHARDS J
    CIA's internecine struggle in the 1960s about counterespionage left a cloud over counterintelligence disciplines there. At the core was the chief, James Angleton, and his trusted Soviet defector, Anatoliy Golitsyn; the trigger was the distrusted defection of another Soviet intelligence officer, Yuriy Nosenko. The saga was Homeric. It has been told many times-but never, I think, so well as in this meticulous logical and empirical exercise. The author has been one of CIA's finest intellects. He has published trenchantly in the open literature on theories of deception and counterdeception. Yet one must now acknowledge that cogent exoneration of Nosenko contributed to permanent rejection of Angleton, and eventually to years of reluctance to suspect even Aldrich Ames. So standards for vigilance remain disputable. Nosenko: Five Paths to Judgment RICHARDS J. HEUER, JR. Yuriy Nosenko, a middle-level KGB officer, volunteered his services to the Central Intelligence Agency in Geneva in 1962 and defected to the United States in 1964. His defection initiated a bitter and divisive contro­ versy over his bona fides that lasted at least 10 years, seriously impaired CIA operations against the Soviet Union, and today still simmers beneath the sur­ face of debates about Soviet deception. This study tells much ofthis important and fascinating case, but that is not its only purpose. It also explores some ofthe fundamental yet often unrecog­ nized assumptions that channel our thinking as we analyze the possibility of deception. The Nosenko controversy is used to illustrate five fundamentally different criteria for making judgments about deception. Examination of the controversy shows that the analytical criterion one uses determines what evi­ dence one looks at and possibly the conclusion one reaches.
    [Show full text]
  • David Sheldon Boone Charging Him with Selling the Security Apparatus
    CHAPTER 2 INTRODUCTION In the early 1990s, the new Russian in the Leningrad KGB.1 Putin also quietly replaced counterintelligence service embarked on a mission fourteen presidential representatives in the regions to reclaim the former KGB’s internal security with former security offi cers. power, which had been diminished with the fall of the Soviet Union in 1991. A spate of press FSB director Patrushev said that, in 1999, his service articles in early 1996 by spokesmen for the Federal stopped the activities of 65 foreign individual Security Service (FSB) boasted the service’s role in offi cers and prevented 30 Russian citizens from protecting the state from foreign subversion. FSB passing secrets to foreign intelligence services. In offi cers noted that the service has the responsibility 1998, the FSB foiled the activities of 11 intelligence to monitor foreign astronauts at “Star City” and to offi cers and caught 19 Russian citizens attempting to prevent the emigration of Russian scientists. The sell classifi ed information to foreign secret services. FSB has also bragged about the arrest of Israeli, And in 1996, then-FSB chief Nikolai Kovalyov said Turkish, and North Korean spies and the expulsion the FSB had exposed 400 employees of foreign of a British businessman and an Israeli diplomat. intelligence services and 39 Russians working for The government moves against ecologists further them during the period 1994-96. revealed a resurgence of FSB internal power. The Sutyagin case follows the sentencing in Although there continues to be mutually benefi cial December 2000 of retired US Navy offi cer Edmund cooperation between Washington and Moscow, Pope to 20 years for spying.
    [Show full text]
  • Soviet "Active Measures" and the Freeze 07/14/1982 (1) Box: RAC Box 27
    Ronald Reagan Presidential Library Digital Library Collections This is a PDF of a folder from our textual collections. Collection: DeGraffenreid, Kenneth E.: Files Folder Title: Soviet "Active Measures" and the Freeze 07/14/1982 (1) Box: RAC Box 27 To see more digitized collections visit: https://reaganlibrary.gov/archives/digital-library To see all Ronald Reagan Presidential Library inventories visit: https://reaganlibrary.gov/document-collection Contact a reference archivist at: [email protected] Citation Guidelines: https://reaganlibrary.gov/citing National Archives Catalogue: https://catalog.archives.gov/ Statement of Stanislav Levchenko / SOVIET ACTIVE MEASURES Wednesday, July 14, 1982 U.S. House of Representatives Permanent Select Committee on ~ntelligence Washington, D.C. The Committee met, pursuant to notice, at 9:05 o'clock a.m., in Room H-405, the Capitol, the Honorable Edward P. Boland (Chairman of the Committee) presiding. Present: Representatives Boland (presiding), Mazzoli, Mineta, Stump, McClory, Whitehurst and Young. Also present: Thomas K. Latimer,' Staff Director; Michael J. O'Neil, Chief Counsel; Patrick G. Long, Associate Counsel; Sharon Leary, Assistant Clerk of the Committee; and Herbert Romerstein, Richard H. Giza, G. Elizabeth Keyes, Annette H. Smiley, and Diane E. La Voy, Professional Staff Members; and Ira H. Goldman, Counsel. P R O C E E D I N G S The Chairman. The Committee will come to order. We are delighted to have with us this morning, we welcome, Stanislav Levchenko, a KGB major who defected to the United States in 1979. Our understanding of Mr. Levchenko'i background as supplied by himself and also by those who are with the CIA is that he is one of the most knowledgeable people in the West on Soviet active measures.
    [Show full text]